<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Iam on security ?!</title><link>https://adicpnn.com/tags/iam/</link><description>Recent content in Iam on security ?!</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Thu, 12 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://adicpnn.com/tags/iam/index.xml" rel="self" type="application/rss+xml"/><item><title>Cloudfoxable - Backwards</title><link>https://adicpnn.com/blog/cloudfoxable/backwards/</link><pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate><guid>https://adicpnn.com/blog/cloudfoxable/backwards/</guid><description>&lt;!-- raw HTML omitted --&gt;
&lt;p&gt;In some challenges, you might not see an IAM role or an IP address as the starting point, but rather, an interesting ARN or something like that.&lt;/p&gt;
&lt;p&gt;Sometimes during cloud penetration tests, we first find something interesting and then work backwards to see who has access to it. Is it just the Administrators? Well, that&amp;rsquo;s not really a big deal. Is it all developers, or all users, or anyone in the world? That might be a really big deal!&lt;/p&gt;</description></item><item><title>Cloudfoxable - Pain</title><link>https://adicpnn.com/blog/cloudfoxable/pain/</link><pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate><guid>https://adicpnn.com/blog/cloudfoxable/pain/</guid><description>&lt;!-- raw HTML omitted --&gt;
&lt;p&gt;In the 2022 FIFA World Cup, Christian Pulisic put his body on the line to net a crucial goal for the USA, ensuring their progression beyond the group stage: &lt;a href="https://www.youtube.com/watch?v=Y7VA30UYlQo"&gt;https://www.youtube.com/watch?v=Y7VA30UYlQo&lt;/a&gt;. He did what he had to do, even though he knew it was going to hurt.&lt;/p&gt;
&lt;p&gt;Similarly, during a penetration test, whether in a cloud environment or otherwise, you might identify a exploit path that won&amp;rsquo;t be pleasant to exploit, but you know the end result will be worth it.&lt;/p&gt;</description></item><item><title>Cloudfoxable - Root</title><link>https://adicpnn.com/blog/cloudfoxable/root/</link><pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate><guid>https://adicpnn.com/blog/cloudfoxable/root/</guid><description>&lt;!-- raw HTML omitted --&gt;
&lt;p&gt;You&amp;rsquo;ve just gained access to the role Kent. Can you get to the root flag in the SSM parameter store?&lt;/p&gt;
&lt;!-- raw HTML omitted --&gt;
&lt;h3 id="information-gathering"&gt;Information Gathering&lt;/h3&gt;
&lt;p&gt;Short and concise challenge details, I will start by preparing a profile for ramos, and checking which policies are attached to it.&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;div class="chroma"&gt;
&lt;table class="lntable"&gt;&lt;tr&gt;&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code&gt;&lt;span class="lnt"&gt; 1
&lt;/span&gt;&lt;span class="lnt"&gt; 2
&lt;/span&gt;&lt;span class="lnt"&gt; 3
&lt;/span&gt;&lt;span class="lnt"&gt; 4
&lt;/span&gt;&lt;span class="lnt"&gt; 5
&lt;/span&gt;&lt;span class="lnt"&gt; 6
&lt;/span&gt;&lt;span class="lnt"&gt; 7
&lt;/span&gt;&lt;span class="lnt"&gt; 8
&lt;/span&gt;&lt;span class="lnt"&gt; 9
&lt;/span&gt;&lt;span class="lnt"&gt;10
&lt;/span&gt;&lt;span class="lnt"&gt;11
&lt;/span&gt;&lt;span class="lnt"&gt;12
&lt;/span&gt;&lt;span class="lnt"&gt;13
&lt;/span&gt;&lt;span class="lnt"&gt;14
&lt;/span&gt;&lt;span class="lnt"&gt;15
&lt;/span&gt;&lt;span class="lnt"&gt;16
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;
&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-bash" data-lang="bash"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;adicpnn@laboratory cloud % cat ~/.aws/config&lt;span class="p"&gt;|&lt;/span&gt; tail
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="o"&gt;[&lt;/span&gt;profile kent&lt;span class="o"&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="nv"&gt;region&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; eu-central-1
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="nv"&gt;role_arn&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; arn:aws:iam::129323993607:role/Kent
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="nv"&gt;source_profile&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; cloudfoxable
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;adicpnn@laboratory cloud % aws iam list-attached-role-policies --role-name Kent --profile cloudfoxable
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="o"&gt;{&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;AttachedPolicies&amp;#34;&lt;/span&gt;: &lt;span class="o"&gt;[&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="o"&gt;{&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;PolicyName&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;root-policy1&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;PolicyArn&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;arn:aws:iam::129323993607:policy/root-policy1&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="o"&gt;}&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="o"&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="o"&gt;}&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;p&gt;A single policy attached, let&amp;rsquo;s see what type of access it grants.&lt;/p&gt;</description></item><item><title>Cloudfoxable - Segue</title><link>https://adicpnn.com/blog/cloudfoxable/segue/</link><pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate><guid>https://adicpnn.com/blog/cloudfoxable/segue/</guid><description>&lt;!-- raw HTML omitted --&gt;
&lt;p&gt;You&amp;rsquo;ve just gained access to the reinier role. Utilize cloudfox and see where it takes you!&lt;/p&gt;
&lt;!-- raw HTML omitted --&gt;
&lt;h3 id="information-gathering"&gt;Information Gathering&lt;/h3&gt;
&lt;p&gt;First things first, set up the profile, and test access.&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;div class="chroma"&gt;
&lt;table class="lntable"&gt;&lt;tr&gt;&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code&gt;&lt;span class="lnt"&gt; 1
&lt;/span&gt;&lt;span class="lnt"&gt; 2
&lt;/span&gt;&lt;span class="lnt"&gt; 3
&lt;/span&gt;&lt;span class="lnt"&gt; 4
&lt;/span&gt;&lt;span class="lnt"&gt; 5
&lt;/span&gt;&lt;span class="lnt"&gt; 6
&lt;/span&gt;&lt;span class="lnt"&gt; 7
&lt;/span&gt;&lt;span class="lnt"&gt; 8
&lt;/span&gt;&lt;span class="lnt"&gt; 9
&lt;/span&gt;&lt;span class="lnt"&gt;10
&lt;/span&gt;&lt;span class="lnt"&gt;11
&lt;/span&gt;&lt;span class="lnt"&gt;12
&lt;/span&gt;&lt;span class="lnt"&gt;13
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;
&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-bash" data-lang="bash"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;adicpnn@laboratory cloud % cat ~/.aws/config &lt;span class="p"&gt;|&lt;/span&gt; tail
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="o"&gt;[&lt;/span&gt;profile reinier&lt;span class="o"&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="nv"&gt;region&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; eu-central-1
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="nv"&gt;role_arn&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; arn:aws:iam::129323993607:role/reinier
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="nv"&gt;source_profile&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; cloudfoxable
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;adicpnn@laboratory cloud % aws sts get-caller-identity --profile reinier
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="o"&gt;{&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;UserId&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;AROAR4HCPRIDTDEJTABUR:botocore-session-1773311810&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;Account&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;129323993607&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;Arn&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;arn:aws:sts::129323993607:assumed-role/reinier/botocore-session-1773311810&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="o"&gt;}&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;p&gt;Then, enumerating attached policies.&lt;/p&gt;</description></item></channel></rss>